Network Activity Monitoring Against Malware in Android Operating System
نویسندگان
چکیده
منابع مشابه
Evaluating Android Anti-malware against Transformation Attacks
Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats but a...
متن کاملAndroid Operating System
The Android is an operating system for mobile devices such as cellular phones, table computersand netbooks. Android is developed by Google and is based upon the Linux Kernel and GNUsoftware. Android has a large community of developers writing application programs("apps") that extend the functionality of the devices. The Android operating SystemSoftware Stack consis...
متن کاملAndroid Malware Detection Using Backpropagation Neural Network
The rapid growing adoption of android operating system around the world affects the growth of malware that attacks this platform. One possible solution to overcome the threat of malware is building a comprehensive system to detect existing malware. This paper proposes multilayer perceptron artificial neural network trained with backpropagation algorithm to determine an application is malware or...
متن کاملAndroid Operating System Security Models: UNIX & Android
The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In thi...
متن کاملAndroid Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against malicious applications is essential. Android users typically install applications from large remote repositories, which provides ample opportunities for malicious newcomers. In this paper, we propose a simple, and yet highly effective technique for detecting malicious Android applications on a repository level. Our te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2016
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v6i1.pp249-256